Cryptography in Ancient Civilizations Katie Grossman Tracie Lo Lauren Schmetterling.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Writing a Social Studies Essay Document-Based Questions & Essay
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
The History of Numbers.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Cryptography Week-6.
Writing Whole Numbers K. McGivney MAT400
TEKS 8C: Calculate percent composition and empirical and molecular formulas. Sumerian Civilization.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Keeping Count Writing Whole Numbers
1 CAVE WALLS TO ALPHABETS BIRTH OF GRAPHICS: Copyright © Texas Education Agency, 2014, All rights reserved. Images and other multimedia content used with.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
1 Hieroglyphs. Hieroglyphs deciphered 2  The ancient Egyptian word for hieroglyphs, literally translated as “language of the gods”  Priests used hieroglyphs.
Four Basic Periods The Pre-mechanical Age The Mechanical
The rich land between the Tigris and Euphrates Rivers supported many farming villages. In the region called Mesopotamia, which meant “the land between.
Egyptian civilization. Mathematics as we know is a product of civilization: the culture of people who live in permanent cities and have to deal with problems.
Cultural Influence and Contributions of Islam
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Chapter 12 Information Systems. 2 Managing Information Information system Software that helps the user organize and analyze data Electronic spreadsheets.
Babylonian and Egyptian Mathematics. Introduction.
Warm Up: What do you think the first civilization looked like? Be descriptive in your response. (Tell me details) What do you think the first civilization.

Encryption: A Brief History Author: Margery Waldron.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
AP World History: Life in Mesopotamia. Presentation Outline 1)Geography of Mesopotamia 2)Cuneiform writing system 3)Advances in the sciences 4)Art and.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
Gilgamesh
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Traditional Symmetric-Key Ciphers
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Writing and Accounting Key Concept 1.3 = Importance of laws, literature, and systems of record keeping.
Historical Orientation – Mesopotamia Once again: “The past is a foreign country; they do things differently there” L.P. Hartley, The Go-Between Today,
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
What were the important contributions of Mesopotamia to the world?
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
How Numbers developed. by Pavitra Cumaraswamy. The history of Ancients using numbers The best known ancient numeral system is Roman numerals. In the 14.
1. Uses left-to-right progression Reading Standards: Foundational Skills Trimester1234 1st – 3 rd Student does not use left-to- right progression. Student.
The Land Between Two Rivers
CSCI-235 Micro-Computers in Science Privacy & Security.
Some of these PowerPoint pages were created by my friend Shawna Haider.
National Curriculum New curriculum 2014 September 2014 – Years 1, 3, 4, 5 September 2015 – Years 1-6 Generally slimmed down in content Content is.
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
Muslim Achievement Chapter 10 Section 3.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Objectives Understand how geography influenced the development of civilization in the Fertile Crescent. Outline the main features of Sumerian civilization.
History of Math Numbers vs. Numerals.
Chapter 2 Basic Encryption and Decryption
Mesopotamia One of the earliest settled civilizations on the plains between the Tigris and Euphrates Rivers.
Mesopotamia One of the earliest settled civilizations on the plains between the Tigris and Euphrates Rivers.
Mathematics in Mesopotamia
CSCI-235 Micro-Computer Applications
Chapter 3:Cryptography (16M)
Presentation transcript:

Cryptography in Ancient Civilizations Katie Grossman Tracie Lo Lauren Schmetterling

Arab Contributions to Cryptology Wide contributions were not recognized until recent discoveries of books written by 3 scholars David Kahn – “ Cryptology was born among the Arabs ” Some discoveries are still used in modern cryptography

Factors Behind The Arab Advancement In Cryptology Translation Linguistic Studies Administrative Studies Public Literacy Advanced Mathematics Concept of zero and Arabic numerals allowed analytical methods such as frequency analysis and computation of letter combinations possible

Al-Kindi ( ) Born around 718 in al-Kufa Iraq Received an education in various sciences First to recognize the idea of a comprehensive dictionary Wrote the first known book on cryptology

Al-Kindi ’ s Contributions Cryptanalysis techniques One for normal text One for poetry Four methods for normal text Quantitative techniques Qualitative techniques Probable words Vowel consonant combinations

Al-Kindi Contributions (2) Tree diagram classification of major types of cipher PICTURE HERE

Al Khalil ’ s Contributions (3) Most important – statistical techniques Determined letter frequencies Set conditions on length of text required for this statistical analysis

Ibn Adlan Born in Mosul, Iraq in 1187 Received an education in Baghdad and later taught in Cairo Only wrote 4 books, 2 on cryptology

Ibn Adlan ’ s Contributions Concept of Variable key for simple substitution Detailed study of word spaces Used different symbols for spacing Length should be at least 90 letters long for frequency analysis. Categorized letters into 3 groups Common, Medium, Rare Most remarkable- step by step method of breaking a cipher

Ibn ad-Durayhim Born in Mosul in 1312 Most important – in depth description of 8 cipher systems Transposition Substitution Introduced the idea of what is now known as a Vigenere table letter addition and omission Simple cipher mechanisms Arithmetic cipher Letter-word substitutions Substitution for plaintext letters Use of invented symbols for letters

Mesopotamia The oldest known example of Mesopotamian cryptography is a small encrypted cuneiform tablet dating about 1500 B.C.E. found on the banks of the Tigris River. It used cuneiform sign in their least common syllabic values, left out the first consonant of several signs, and used multiple spellings for the same word. Cuneiform Tablet

Mesopotamia Cont. Colophons, stereotyped ending formulas, are used by Babylonian and Assyrian scribes to sign and date their clay tablets. They substituted the standard signs with rare and unusual ones. Colophons were later encrypted with numbers substituting the signs. Tablet fragments have been found that may be part of a colophon codebook, the oldest in the world.

India Artha-sastra by Kautilya discusses the use of cryptology in political circles. Officers in institutes of espionage used secret writing to communicate with their spies while they were in the field. It also contain the first reference in history to the use of cryptanalysis for political gain.

India Cont. The famous Kama-sutra by Vatsyayana lists secret writing as one of the 64 arts, or yogas, that should be known and practiced. It is called malachite-vikalpa and two types are described known as kautiliyam and muladeviya. Kautiliyam is a simple substitution cipher; muladeviya exists in both written and spoken form.

India Cont. Ancient Indians also made use of verbal and visual codes. Sabhasa is a form of oral code that uses allusive language. Nirbhasa is a kind of finger communication or sign language. These simple codes are still in use today by Indian traders and moneylenders.

Incan Cryptography Series of strands made from llama or alpaca hair Knots on the strings would symbolize numbers, letters, and algebraic functions Initially for record keeping, but turned into a way to exchange information secretly About 700 currently known pus/quipus.htm

Numerical Usage About 2/3 of known khipu document numerical data such as accounts and financial transactions The number zero is represented by the absence of a knot Number one is represented by a figure eight knot Digits two through nine are represented by a knot enclosing the proportionate amount of turns Larger numbers are denoted by combining the smaller digits

Word Representation Remaining 1/3 of known khipu represent history, stories, and messages Letters cannot be easily deciphered Context determines meaning Relative position to other strands and strand color are vital Puruchuco palace was an indicator that khipu were narratives Not all khipu have been fully deciphered yet

Khipu as Encryption Estimated that there were many more khipu When the Spanish invaded the Incas, they banned the code Especially threatening for a dictator government Incas could communicate secretly with each other

Codes of Ancient Greece All hand written codes Vary in security Phiastos Disk- cannot be broken Scytale- code as simple as they come Polybius square- one of earliest substitution

Cryptography in Greek Life Huge part of life The Iliad Aeneas Tacticus- On the Defense of Fortifications First civilization to make use of cryptology in war- scytale, transposition hilltop distribution

Ancient Europe Germanic people of today ’ s Britain, N. Europe, Iceland, and Scandinavia used codes in runic Kylver Stone- oldest runic writing from 400 AD Rok Stone- written in another variation of runic; dates from 800 AD The Rok Stone